Primary Menu

Recently Google launched an IoT framework to compete head-on with the IoT framework of Amazon. For the user it is more important to know, why would you use an IoT framework? How do such frameworks minimize time to market? And what about security?

Earlier this week I went to an inaugural talk, at the Singapore Management University (SMU), called The State Of Cyber Threats And How To Fight Back. The main subject was cybersecurity and the inauguration of Professor Robert Deng for the AXA Chair Professor of Cybersecurity. Throughout the presentation and forum discussion, several trends were raised. Read More …

If we look at the history of the Internet of Things (IoT), its existence is derived from the trend Machine-to-Machine communication (M2M). M2M was focused on the business to business market. Connectivity was not yet so inexpensive as nowadays. Connectivity modules were limited to engineering companies, that implemented e.g. cellular connections for production machines in Read More …

Because of my fascination for innovation, startups and working on the idea of bRemote, I came across the book “The Innovator’s Dilemma”. This book is written by Harvard Professor and businessmen Clayton Christensen. The book gives multiple insights that can be helpful for people dealing with innovation, and specifically the management of large companies that tend Read More …

Why Singapore you will think? Because this week we decided to go to Singapore in February 2017, currently we live in the Netherlands. The reason for this is that my girlfriend got a position offered and we decided this would be a great adventure for both of us. This does not mean I will stop Read More …

In this blog post, I would like to share some information on a project that I am currently working on, called bRemote (Bee Remote). This project is part of a course I currently attend, called Master Class High-Tech Systems Creations. This Master Class creates a multidisciplinary setting, where it educates in System Architecting, Business Development Read More …

Are you interested in what the role of a System Architect is? Most people that think of an Architect, think of someone who plans and designs a building. During construction he/she keeps a close eye on details. A System Architect is doing something similar, except it is not a building but a (high-tech) system. This Read More …

Many of you probably heard of Bug bounties. They are organized by companies that develop software / websites and reward people that report bugs found in their software. This reward can be a simple thanks or recognition, but also a reasonable amount of money. Why would companies do this? Of course companies test their software Read More …

This is the second and last part of running Jenkins in a Linux Container. It started with the thought to use Linux containers, and why not for a real use case of running Jenkins in the container. If you have missed the first part you can click on the link. We left of were Jenkins Read More …

Running Ubuntu 15.10 I wanted to get some experience on Linux Containers. Since Containers look like a nice solution for deployment, I thought to combine it with a real use case to run Jenkins (software for Continuous Integration) in a container. So first some explanation on Linux Containers followed by an introduction on Jenkins and then the Read More …